Please use this identifier to cite or link to this item:
http://hdl.handle.net/10553/51895
DC Field | Value | Language |
---|---|---|
dc.contributor.author | De La Puente Arrate, Fernando | en_US |
dc.contributor.author | Sandoval, J. D. | en_US |
dc.contributor.author | Hernández, P. | en_US |
dc.contributor.author | Molina, C. J. | en_US |
dc.date.accessioned | 2018-11-25T05:10:18Z | - |
dc.date.available | 2018-11-25T05:10:18Z | - |
dc.date.issued | 2005 | en_US |
dc.identifier.isbn | 0-7803-9245-0 | en_US |
dc.identifier.issn | 1071-6572 | en_US |
dc.identifier.other | WoS | - |
dc.identifier.uri | http://hdl.handle.net/10553/51895 | - |
dc.description.abstract | Even though it probably has never happened to us, it is possible to introduce our credit card on an ATM and have it steal the money from our account or access our bank account from a computer and have someone else getting access to it. In the first case we believe that the ATM is a trusted device and will never try to cheat us. In the second case, we believe that our computer provides a safe environment for electronic banking. Although there are a few records in history of ATM fraud, we generally believe that it won't happen to us. However, we all know that computers are not safe and still take the risk. Viruses and trojans (malicious software) can do all this and much more, not only in movies but in the real world. This is possible just because we are giving away all the information needed to access our money instead of keeping them. In the first case we are giving away Our credit card and the PIN (Personal Identification Number) and in the second case we are giving away our login and password/s. Anyone who can intercept this information can successfully pretend to be us and withdraw our money. Digital signature can solve these problems providing the means for validating a user or a given operation without. exposing the data required to do it.. However, the point is not if digital signature is the best way to protect our money, but how to implement the system in a way that is easy to use and safe enough.Here we will propose some possible implementations based on die idea that not only digital Signature is needed but also human interaction is required in order to avoid a classic man-in-the-middle-attack. It is not safe to introduce a smart card on a standard smart card reader, introduce the PIN on the application used to access it, and then expect the application to do exactly what we tell it to do. That would be perfectly fine in a world where we can trust. each Other and we can consider computers to be completely safe from intrusions. But the truth is unfortunately far from being like that and so we need to look for new ways to protect us from this kind of attacks.Several hardware devices will be Proposed based on a basic structure where we have a display, some Way to input data (such as a keyboard or a few buttons) and some way to communicate with any computer. | en_US |
dc.language | eng | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.relation.ispartof | Proceedings - International Carnahan Conference on Security Technology | en_US |
dc.source | 39Th Annual 2005 International Carnahan Conference On Security Technology, Proceedings [ISSN 0737-1160], p. 174-177, 2005 | en_US |
dc.subject | 33 Ciencias tecnológicas | en_US |
dc.title | Improving online banking security with hardware devices | en_US |
dc.type | info:eu-repo/semantics/conferenceObject | en_US |
dc.type | ConferenceObject | en_US |
dc.relation.conference | 39th Annual 2005 International Carnahan Conference on Security Technology, CCST'05 | en_US |
dc.identifier.doi | 10.1109/CCST.2005.1594874 | en_US |
dc.identifier.scopus | 42749108977 | - |
dc.identifier.isi | 000236384200037 | - |
dc.contributor.authorscopusid | 55349233000 | - |
dc.contributor.authorscopusid | 7103327940 | - |
dc.contributor.authorscopusid | 7202207043 | - |
dc.contributor.authorscopusid | 57206134697 | - |
dc.contributor.authorscopusid | 57203153379 | - |
dc.description.lastpage | 177 | en_US |
dc.identifier.issue | 1594874 | - |
dc.description.firstpage | 174 | en_US |
dc.investigacion | Ingeniería y Arquitectura | en_US |
dc.type2 | Actas de congresos | en_US |
dc.contributor.daisngid | 10495065 | - |
dc.contributor.daisngid | 29434884 | - |
dc.contributor.daisngid | 9976844 | - |
dc.contributor.daisngid | 4147940 | - |
dc.description.numberofpages | 4 | en_US |
dc.utils.revision | Sí | en_US |
dc.contributor.wosstandard | WOS:Puente, F | - |
dc.contributor.wosstandard | WOS:Sandoval, JD | - |
dc.contributor.wosstandard | WOS:Hernandez, P | - |
dc.contributor.wosstandard | WOS:Molina, CJ | - |
dc.date.coverdate | Diciembre 2005 | en_US |
dc.identifier.conferenceid | events121333 | - |
dc.identifier.ulpgc | Sí | en_US |
item.fulltext | Sin texto completo | - |
item.grantfulltext | none | - |
crisitem.event.eventsstartdate | 11-10-2005 | - |
crisitem.event.eventsenddate | 14-10-2005 | - |
crisitem.author.dept | GIR IUMA: Equipos y Sistemas de Comunicación | - |
crisitem.author.dept | IU de Microelectrónica Aplicada | - |
crisitem.author.dept | Departamento de Ingeniería Telemática | - |
crisitem.author.dept | GIR IUMA: Equipos y Sistemas de Comunicación | - |
crisitem.author.dept | IU de Microelectrónica Aplicada | - |
crisitem.author.dept | Departamento de Ingeniería Telemática | - |
crisitem.author.dept | GIR IUMA: Sistemas de Información y Comunicaciones | - |
crisitem.author.dept | IU de Microelectrónica Aplicada | - |
crisitem.author.dept | Departamento de Ingeniería Telemática | - |
crisitem.author.orcid | 0000-0001-8724-0266 | - |
crisitem.author.orcid | 0000-0002-1711-9572 | - |
crisitem.author.orcid | 0000-0002-0907-4765 | - |
crisitem.author.parentorg | IU de Microelectrónica Aplicada | - |
crisitem.author.parentorg | IU de Microelectrónica Aplicada | - |
crisitem.author.parentorg | IU de Microelectrónica Aplicada | - |
crisitem.author.fullName | De La Puente Arrate, Fernando | - |
crisitem.author.fullName | Sandoval González, Juan Domingo | - |
crisitem.author.fullName | Hernández Morera, Pablo Vicente | - |
Appears in Collections: | Actas de congresos |
Items in accedaCRIS are protected by copyright, with all rights reserved, unless otherwise indicated.